CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses. | 7.1 |
High |
||
An out-of-bounds read in Organization Specific TLV was found in various versions of OpenvSwitch. | 9.8 |
Critical |
||
An integer underflow in Organization Specific TLV was found in various versions of OpenvSwitch. | 9.8 |
Critical |
||
A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments. | 7.5 |
High |
||
In lib/ofp-util.c in Open vSwitch (OvS) before 2.8.1, there are multiple memory leaks while parsing malformed OpenFlow group mod messages. NOTE: the vendor disputes the relevance of this report, stating "it can only be triggered by an OpenFlow controller, but OpenFlow controllers have much more direct and powerful ways to force Open vSwitch to allocate memory, such as by inserting flows into the flow table." | 5.9 |
Medium |